Agile IT Organization Design: For Digital Transformation and Continuous Delivery

Addison-Wesley Professional
3
Free sample

Design IT Organizations for Agility at Scale

Aspiring digital businesses need overall IT agility, not just development team agility. In Agile IT Organization Design , IT management consultant and ThoughtWorks veteran Sriram Narayan shows how to infuse agility throughout your organization. Drawing on more than fifteen years’ experience working with enterprise clients in IT-intensive industries, he introduces an agile approach to “Business–IT Effectiveness” that is as practical as it is valuable.

The author shows how structural, political, operational, and cultural facets of organization design influence overall IT agility—and how you can promote better collaboration across diverse functions, from sales and marketing to product development, and engineering to IT operations. Through real examples, he helps you evaluate and improve organization designs that enhance autonomy, mastery, and purpose: the key ingredients for a highly motivated workforce.

You’ll find “close range” coverage of team design, accountability, alignment, project finance, tooling, metrics, organizational norms, communication, and culture. For each, you’ll gain a deeper understanding of where your organization stands, and clear direction for making improvements. Ready to optimize the performance of your IT organization or digital business? Here are practical solutions for the long term, and for right now.

  • Govern for value over predictability
  • Organize for responsiveness, not lowest cost
  • Clarify accountability for outcomes and for decisions along the way
  • Strengthen the alignment of autonomous teams
  • Move beyond project teams to capability teams
  • Break down tool-induced silos
  • Choose financial practices that are free of harmful side effects
  • Create and retain great teams despite today’s “talent crunch”
  • Reform metrics to promote (not prevent) agility
  • Evolve culture through improvements to structure, practices, and leadership—and careful, deliberate interventions
Read more

About the author

Sriram Narayan, an IT management consultant with ThoughtWorks, has provided IT agility guidance to clients in telecom, financial services, energy, retail, and Internet businesses. He has also served as a leadership coach and a director of innovation. He was a founding member of the ThoughtWorks technology advisory board–the group that now authors Technology Radar. During a two-year stint at the products division of ThoughtWorks, he helped with product innovation and advocacy on Go–a tool that helps with continuous delivery. He has also worn the hats of a developer, open-source contributor, manager, product owner, tester, SOA architect, trainer, and Agile coach. An occasional blogger and speaker at conferences, his writings, talks, and contact information are available from sriramnarayan.com. The opinions in this book are his own.

Read more
5.0
3 total
Loading...

Additional Information

Publisher
Addison-Wesley Professional
Read more
Published on
Jun 11, 2015
Read more
Pages
304
Read more
ISBN
9780133904246
Read more
Language
English
Read more
Genres
Business & Economics / Information Management
Computers / Management Information Systems
Read more
Content Protection
This content is DRM protected.
Read more
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.

Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.

This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.

Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
The Data Vault was invented by Dan Linstedt at the U.S. Department of Defense, and the standard has been successfully applied to data warehousing projects at organizations of different sizes, from small to large-size corporations. Due to its simplified design, which is adapted from nature, the Data Vault 2.0 standard helps prevent typical data warehousing failures.

"Building a Scalable Data Warehouse" covers everything one needs to know to create a scalable data warehouse end to end, including a presentation of the Data Vault modeling technique, which provides the foundations to create a technical data warehouse layer. The book discusses how to build the data warehouse incrementally using the agile Data Vault 2.0 methodology. In addition, readers will learn how to create the input layer (the stage layer) and the presentation layer (data mart) of the Data Vault 2.0 architecture including implementation best practices. Drawing upon years of practical experience and using numerous examples and an easy to understand framework, Dan Linstedt and Michael Olschimke discuss:

How to load each layer using SQL Server Integration Services (SSIS), including automation of the Data Vault loading processes.

Important data warehouse technologies and practices.

Data Quality Services (DQS) and Master Data Services (MDS) in the context of the Data Vault architecture.

Provides a complete introduction to data warehousing, applications, and the business context so readers can get-up and running fast Explains theoretical concepts and provides hands-on instruction on how to build and implement a data warehouseDemystifies data vault modeling with beginning, intermediate, and advanced techniquesDiscusses the advantages of the data vault approach over other techniques, also including the latest updates to Data Vault 2.0 and multiple improvements to Data Vault 1.0
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.